Analysis
-
max time kernel
141s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
03-08-2024 00:39
Behavioral task
behavioral1
Sample
GlucoseBootstrapper.exe
Resource
win7-20240729-en
General
-
Target
GlucoseBootstrapper.exe
-
Size
310KB
-
MD5
42b5a7ab130d52ef5d1cdb8f1a62e70c
-
SHA1
43b4275d2442fc2e352dc1890b0dfa031f6aec88
-
SHA256
27bea02ba16a40be47d94547a9cad6dbc6b40111bbf7616c175cf81c83260a5e
-
SHA512
1eee045c0d92e8e235694620ea53f379a6a87514b84a0783ff92c85187a51b6a03e7d839910a564e1f7f58d861be87597e3cef056e103877ff6067648dbf7979
-
SSDEEP
6144:rW991UbxJWt5c2xE7orTkcikKfnvVREg8SSovnF6zeZm4wgXtMhSWJTz3A2Gatec:rOzw45W26CC
Malware Config
Extracted
xenorat
127.0.0.1
Xeno_rat_nd8912d
-
delay
5000
-
install_path
temp
-
port
4444
-
startup_name
antibyfron
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1968 GlucoseBootstrapper.exe -
Loads dropped DLL 1 IoCs
pid Process 1656 GlucoseBootstrapper.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GlucoseBootstrapper.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GlucoseBootstrapper.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2732 schtasks.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1656 wrote to memory of 1968 1656 GlucoseBootstrapper.exe 30 PID 1656 wrote to memory of 1968 1656 GlucoseBootstrapper.exe 30 PID 1656 wrote to memory of 1968 1656 GlucoseBootstrapper.exe 30 PID 1656 wrote to memory of 1968 1656 GlucoseBootstrapper.exe 30 PID 1968 wrote to memory of 2732 1968 GlucoseBootstrapper.exe 31 PID 1968 wrote to memory of 2732 1968 GlucoseBootstrapper.exe 31 PID 1968 wrote to memory of 2732 1968 GlucoseBootstrapper.exe 31 PID 1968 wrote to memory of 2732 1968 GlucoseBootstrapper.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\GlucoseBootstrapper.exe"C:\Users\Admin\AppData\Local\Temp\GlucoseBootstrapper.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Users\Admin\AppData\Local\Temp\XenoManager\GlucoseBootstrapper.exe"C:\Users\Admin\AppData\Local\Temp\XenoManager\GlucoseBootstrapper.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "antibyfron" /XML "C:\Users\Admin\AppData\Local\Temp\tmpBAE6.tmp" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2732
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5479d65117a5f7fac01ce118201caafb3
SHA1b2d86fc21c0a76e9affa72fb3a5c2ae415219dc3
SHA25600a4d1e077010c21caad86d8abb241f758cb1fe6b5d3ca28fd951f982825b1e3
SHA512e07eca7b339b617e1156d13c24c087f4f519dd3a24d60717c2e2decba13243ec2b428280725072cef92045534f67abc9e26daac8dba6114a96703c7dd9ba990f
-
Filesize
310KB
MD542b5a7ab130d52ef5d1cdb8f1a62e70c
SHA143b4275d2442fc2e352dc1890b0dfa031f6aec88
SHA25627bea02ba16a40be47d94547a9cad6dbc6b40111bbf7616c175cf81c83260a5e
SHA5121eee045c0d92e8e235694620ea53f379a6a87514b84a0783ff92c85187a51b6a03e7d839910a564e1f7f58d861be87597e3cef056e103877ff6067648dbf7979